Haojin Zhu

Orcid: 0000-0001-5079-4556

Affiliations:
  • Shanghai Jiao Tong University, Shanghai, China


According to our database1, Haojin Zhu authored at least 213 papers between 2005 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2023, "For contributions to Vehicular Networks and Internet-of-Things Security".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
De-Anonymizing Avatars in Virtual Reality: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., December, 2024

Privacy-Preserving Location-Based Advertising via Longitudinal Geo-Indistinguishability.
IEEE Trans. Mob. Comput., August, 2024

Backdoor Attacks against Learning-Based Algorithms
Wireless Networks, Springer, ISBN: 978-3-031-57388-0, 2024

LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024

Dangers Behind Charging VR Devices: Hidden Side Channel Attacks via Charging Cables.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Liveness Detection for Securing Smart Voice Interfaces.
IEEE Trans. Dependable Secur. Comput., 2024

Preface: Security and privacy for space-air-ground integrated networks.
Secur. Saf., 2024

DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Detection and Attribution of Diffusion Model of Character Animation Based on Spatio-Temporal Attention.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Unveiling Collusion-Based Ad Attribution Laundering Fraud: Detection, Analysis, and Security Implications.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

VPVet: Vetting Privacy Policies of Virtual Reality Apps.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

Security in Smart Home Networks
Wireless Networks, Springer, ISBN: 978-3-031-24184-0, 2023

Unleashing Cheapfakes through Trojan Plugins of Large Language Models.
CoRR, 2023

POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices.
Proceedings of the 32nd USENIX Security Symposium, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Vetting Privacy Policies in VR: A Data Minimization Principle Perspective.
Proceedings of the IEEE INFOCOM 2023, 2023

De-anonymization Attacks on Metaverse.
Proceedings of the IEEE INFOCOM 2023, 2023

MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging.
Proceedings of the IEEE INFOCOM 2023, 2023

GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

EM-Whisperer: A Voice Injection Attack via Powerline for Virtual Meeting Scenarios.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Understanding and Identifying Cross-Platform UI Framework Based Potentially Unwanted Apps.
Proceedings of the IEEE Global Communications Conference, 2023

Privacy Computing with Right to Be Forgotten in Trusted Execution Environment.
Proceedings of the IEEE Global Communications Conference, 2023

Wireless Traffic Analysis Based Side-channel Attacks and Countermeasure in Smart Home.
Proceedings of the ACM Turing Award Celebration Conference - China 2023, 2023

2022
Wireless Training-Free Keystroke Inference Attack and Defense.
IEEE/ACM Trans. Netw., 2022

A Federated Learning Based Privacy-Preserving Smart Healthcare System.
IEEE Trans. Ind. Informatics, 2022

WiCapose: Multi-modal fusion based transparent authentication in mobile environments.
J. Inf. Secur. Appl., 2022

Backdoors Against Natural Language Processing: A Review.
IEEE Secur. Priv., 2022

Secure Hierarchical Deterministic Wallet Supporting Stealth Address.
IACR Cryptol. ePrint Arch., 2022

Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers.
Proceedings of the 31st USENIX Security Symposium, 2022

Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

Thwarting Longitudinal Location Exposure Attacks in Advertising Ecosystem via Edge Computing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Tradeoff between Privacy and Utility for Location-based Recommendation Services.
Proceedings of the IEEE International Conference on Communications, 2022

Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Liveness Detection for Voice User Interface via Wireless Signals in IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2021

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021

Grus: Toward Unified-memory-efficient High-performance Graph Processing on GPU.
ACM Trans. Archit. Code Optim., 2021

Advances in privacy-preserving computing.
Peer-to-Peer Netw. Appl., 2021

Collective Memory for Detecting Nonconcurrent Clones: A Localized Approach for Global Topology and Identity Tracing in IoT Networks.
IEEE Internet Things J., 2021

Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021

Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence.
IEEE Internet Things J., 2021

Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks.
CoRR, 2021

BatFL: Backdoor Detection on Federated Learning in e-Health.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Toward Automatically Generating Privacy Policy for Smart Home Apps.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Dissecting Click Fraud Autonomy in the Wild.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Hidden Backdoors in Human-Centric Language Models.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

POSTER: ReAvatar: Virtual Reality De-anonymization Attack Through Correlating Movement Signatures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures.
IEEE Trans. Mob. Comput., 2020

Privacy Leakage via De-Anonymization and Aggregation in Heterogeneous Social Networks.
IEEE Trans. Dependable Secur. Comput., 2020

A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks.
J. Parallel Distributed Comput., 2020

MobiKey: Mobility-Based Secret Key Generation in Smart Home.
IEEE Internet Things J., 2020

iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Voiceprint Mimicry Attack Towards Speaker Verification System in Smart Home.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Securing App Behaviors in Smart Home: A Human-App Interaction Perspective.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

2019
Privacy-Preserving Task Scheduling for Time-Sharing Services of Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2019

Detecting Vehicle Anomaly in the Edge via Sensor Consistency and Frequency Characteristic.
IEEE Trans. Veh. Technol., 2019

Location Privacy in Usage-Based Automotive Insurance: Attacks and Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2019

Smart contract for secure billing in ride-hailing service via blockchain.
Peer-to-Peer Netw. Appl., 2019

Pri-RTB: Privacy-preserving real-time bidding for securing mobile advertisement in ubiquitous computing.
Inf. Sci., 2019

Achieving Differentially Private Location Privacy in Edge-Assistant Connected Vehicles.
IEEE Internet Things J., 2019

Edge-Assisted Stream Scheduling Scheme for the Green-Communication-Based IoT.
IEEE Internet Things J., 2019

Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019

Securing android applications via edge assistant third-party library detection.
Comput. Secur., 2019

EdgeSense: Edge-Mediated Spatial- Temporal Crowdsensing.
IEEE Access, 2019

Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Automated and Personalized Privacy Policy Extraction Under GDPR Consideration.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

An Enhanced Verifiable Inter-domain Routing Protocol Based on Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2019

No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization.
Proceedings of the International Symposium on Quality of Service, 2019

Dynamic Traffic Feature Camouflaging via Generative Adversarial Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

An Ensemble Approach for Suspicious Traffic Detection from High Recall Network Alerts.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Securing Consumer IoT in the Smart Home: Architecture, Challenges, and Countermeasures.
IEEE Wirel. Commun., 2018

Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel.
IEEE Trans. Veh. Technol., 2018

Demographic Information Inference through Meta-Data Analysis of Wi-Fi Traffic.
IEEE Trans. Mob. Comput., 2018

Corrections to "Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices" [Mar 18 802-817].
IEEE Trans. Inf. Forensics Secur., 2018

Secret Key Establishment via RSS Trajectory Matching Between Wearable Devices.
IEEE Trans. Inf. Forensics Secur., 2018

Privacy Leakage of Location Sharing in Mobile Social Networks: Attacks and Defense.
IEEE Trans. Dependable Secur. Comput., 2018

Differentially Private Data Generative Models.
CoRR, 2018

Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach.
Comput. Secur., 2018

Modeling Privacy Leakage Risks in Large-Scale Social Networks.
IEEE Access, 2018

Smoke Screener or Straight Shooter: Detecting Elite Sybil Attacks in User-Review Social Networks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

WiVo: Enhancing the Security of Voice Control System via Wireless Signal in IoT Environment.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis.
Proceedings of the IEEE Global Communications Conference, 2018

Detecting Vehicle Anomaly by Sensor Consistency: An Edge Computing Based Mechanism.
Proceedings of the IEEE Global Communications Conference, 2018

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Secur. Commun. Networks, 2017

Guest editorial: Special issue on algorithms, systems and applications in mobile social networks.
Peer-to-Peer Netw. Appl., 2017

SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud.
IEEE Internet Things J., 2017

Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017

Hardening Malware Detection Systems Against Cyber Maneuvers: An Adversarial Machine Learning Approach.
CoRR, 2017

Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Security Modeling and Analysis on Intra Vehicular Network.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Privacy-Preserving Fraud Detection via Cooperative Mobile Carriers with Improved Accuracy.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Speed-Based Location Tracking in Usage-Based Automotive Insurance.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Fake reviews tell no tales? Dissecting click farming in content-generated social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

A Functional Co-Design towards Safe and Secure Vehicle Platooning.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Hybrid de-anonymization across real-world heterogeneous social networks.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks.
Secur. Commun. Networks, 2016

Cyber security, crime, and forensics of wireless networks and applications.
Secur. Commun. Networks, 2016

You Can Jam But You Cannot Hide: Defending Against Jamming Attacks for Geo-Location Database Driven Spectrum Sharing.
IEEE J. Sel. Areas Commun., 2016

Privacy-Preserving Location Proof for Securing Large-Scale Database-Driven Cognitive Radio Networks.
IEEE Internet Things J., 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Automatic Detection of SIP-Aware Attacks on VoLTE Device.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Demographics inference through Wi-Fi network traffic analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Toward Optimal DoS-Resistant Authentication in Crowdsensing Networks via Evolutionary Game.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Efficient and secure message authentication in cooperative driving: A game-theoretic approach.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Traffic Based Lightweight Attack Detection Scheme for VoLTE.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Who Moved My Cheese: Towards Automatic and Fine-Grained Classification and Modeling Ad Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

POSTER: Accuracy vs. Time Cost: Detecting Android Malware through Pareto Ensemble Pruning.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

StormDroid: A Streaminglized Machine Learning-Based System for Detecting Android Malware.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial].
IEEE Wirel. Commun., 2015

Guest editorial: Security and privacy of P2P networks in emerging smart city.
Peer-to-Peer Netw. Appl., 2015

A novel design for content delivery over software defined mobile social networks.
IEEE Netw., 2015

Secure and Privacy-Preserving Location Proof in Database-Driven Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

De-anonymizing social networks: Using user interest as a side-channel.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

SmartSec: Secret sharing-based location-aware privacy enhancement in smart devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Optimal strategies for defending location inference attack in database-driven CRNs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014

UAV-assisted data gathering in wireless sensor networks.
J. Supercomput., 2014

Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid.
IEEE Syst. J., 2014

An attack-and-defence game for security assessment in vehicular ad hoc networks.
Peer-to-Peer Netw. Appl., 2014

Constant-round adaptive zero-knowledge proofs for NP.
Inf. Sci., 2014

Security and privacy for storage and computation in cloud computing.
Inf. Sci., 2014

RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks.
Computing, 2014

Multicloud-Based Evacuation Services for Emergency Management.
IEEE Cloud Comput., 2014

A Paralleling Broadcast Authentication Protocol for Sparse RSUs in Internet of Vehicles.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

All your location are belong to us: breaking mobile social networks for automated user location tracking.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Achieving privacy preservation in WiFi fingerprint-based localization.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Information leaks out: Attacks and countermeasures on compressive data gathering in wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

HVSTO: Efficient privacy preserving hybrid storage in cloud data center.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

You are where you have been: Sybil detection via geo-location analysis in OSNs.
Proceedings of the IEEE Global Communications Conference, 2014

Sybil-aware least cost rumor blocking in social networks.
Proceedings of the IEEE Global Communications Conference, 2014

POSTER: LocMask: A Location Privacy Protection Framework in Android System.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Security Assessment in Vehicular Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-9357-0, 2013

MixZone in Motion: Achieving Dynamically Cooperative Location Privacy Protection in Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2013

Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks.
IEEE Trans. Emerg. Top. Comput., 2013

Security in cognitive radio networks [Guest Editorial].
IEEE Netw., 2013

A Secure and Efficient Data Aggregation Framework in Vehicular Sensing Networks.
Int. J. Distributed Sens. Networks, 2013

SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs.
Ad Hoc Sens. Wirel. Networks, 2013

A localized backbone renovating algorithm for wireless ad hoc and sensor networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

YouSense: Mitigating entropy selfishness in distributed collaborative spectrum sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Location privacy in database-driven Cognitive Radio Networks: Attacks and countermeasures.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

A Scalable and Privacy-Preserving Named Data Networking Architecture Based on Bloom Filters.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Location Privacy Preserving Dynamic Spectrum Auction in Cognitive Radio Network.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

ANTS: Pushing the rapid event notification in wireless sensor and actor networks.
Proceedings of the International Joint Conference on Awareness Science and Technology & Ubi-Media Computing, 2013

Detecting GPS information leakage in Android applications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Security and privacy of collaborative spectrum sensing in cognitive radio networks.
IEEE Wirel. Commun., 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Commun. Mag., 2012

Leveraging Cloud Computing for Privacy Preserving Aggregation in Multi-domain Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Location privacy preservation in collaborative spectrum sensing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks.
Proceedings of IEEE International Conference on Communications, 2012

PMDS: A probabilistic misbehavior detection scheme in DTN.
Proceedings of IEEE International Conference on Communications, 2012

Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

PriMatch: Fairness-aware secure friend discovery protocol in mobile social network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Location privacy leaking from spectrum utilization information in database-driven cognitive radio network.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks.
IEEE Trans. Wirel. Commun., 2011

: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011

Mitigating Entropy Selfishness in Distributed Collaborative Spectrum Sensing
CoRR, 2011

Automatic inference of movements from contact histories.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

A Novel Attack Tree Based Risk Assessment Approach for Location Privacy Preservation in the VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Believe Yourself: A User-Centric Misbehavior Detection Scheme for Secure Collaborative Spectrum Sensing.
Proceedings of IEEE International Conference on Communications, 2011

MobiGame: A User-Centric Reputation Based Incentive Protocol for Delay/Disruption Tolerant Networks.
Proceedings of the Global Communications Conference, 2011

How to design space efficient revocable IBE from non-monotonic ABE.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

MobiID: A User-Centric and Social-Aware Reputation Based Incentive Scheme for Delay/Disruption Tolerant Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

A Routing-Compatible Credit-Based Incentive Scheme for DTNs.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011

2010
Pi: a practical incentive protocol for delay tolerant networks.
IEEE Trans. Wirel. Commun., 2010

PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks.
IEEE Trans. Wirel. Commun., 2010

An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

An efficient dynamic-identity based signature scheme for secure network coding.
Comput. Networks, 2010

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SecCloud: Bridging Secure Storage and Computation in Cloud.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

SAS: A Secure Data Aggregation Scheme in Vehicular Sensing Networks.
Proceedings of IEEE International Conference on Communications, 2010

How to Construct Interval Encryption from Binary Tree Encryption.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Security in service-oriented vehicular networks.
IEEE Wirel. Commun., 2009

PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.
IEEE Trans. Veh. Technol., 2009

SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2009

A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Veh. Technol., 2009

SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wirel. Commun., 2008

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks.
Int. J. Secur. Networks, 2008

Security in vehicular ad hoc networks.
IEEE Commun. Mag., 2008

A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008

BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
An enhanced authenticated key agreement protocol for wireless mobile communication.
Comput. Stand. Interfaces, 2007

TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Two-Factor Localized Authentication Scheme for WLAN Roaming.
Proceedings of IEEE International Conference on Communications, 2007

ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Secure Localized Authentication and Billing for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

2006
Provably secure robust threshold partial blind signature.
Sci. China Ser. F Inf. Sci., 2006

A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
A robust (k, n) + 1 threshold proxy signature scheme based on factoring.
Appl. Math. Comput., 2005


  Loading...